What is the difference between an insider attack and an


Write the questions followed by your answers.

1) You are in charge of IT assets for a company. You are attending a meeting with your management to address questions and concerns around security for the organization. You are the featured presenter at the meeting. The meeting starts in a somewhat unstructured fashion and you are presented with the following questions.

You need to provide an answer for each of the 5 following questions. After you answer these questions you can move to the 2nd part of the presentation.

a) We have never had an attack. Why are you so concerned now?

b) How would we determine what assets we have, what needs to be protected, and how to protect them?

c) I have heard we need a written security policy. Why would we need a written policy? How often would we need to revise it? Who in the organization would need to be involved in this process?

d) What is the difference between an insider attack and an outsider attack?

e) What is this defense in depth approach to security that we keep hearing about?

2) You are in charge of the IT assets for your company. How do you make the case to your management that investing the time and money into malware protection is money well spent?

For this question you need to write an outline for a presentation you are going to make to management to persuade them to invest in malware protection. The approach to the presentation needs to be factually persuasive. In other words, you need to provide an outline that will demonstrate to management through empirical evidence, business acumen, technology trends and project planning why investing in malware protection makes sense.

For each point in your presentation outline you should provide some detail and description that supports why you selected each item.

This is an outline for the presentation rather than the actual presentation. Therefore we are looking for the approach you are going to take for the final presentation and how you will support the various aspects of the presentation. For example, what sort of points are you going to make and how will you support them. The outline will require some of the technical details that will describe how you will build the final presentation.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: What is the difference between an insider attack and an
Reference No:- TGS01148854

Now Priced at $50 (50% Discount)

Recommended (92%)

Rated (4.4/5)

A

Anonymous user

5/26/2016 1:19:35 AM

In a Microsoft word paper, please provide answers for the following questions in an essay format. 1) You are in charge of IT assets for an organization. You are attending a meeting by your management to address the questions and concerns about security for the organization. You are the featured host at the meeting. The meeting begins in a somewhat shapeless fashion and you are represented with the given questions. a) We have never had an attack. Illustrate why are you so concerned now? b) Illustrate how would we find out what assets we have, what requirements to be protected and how to protect them?